created a system exactly identical to the sys- tems
which were used to create the dataset, including the
non-malware system and running services. After that
we mimicked the infection by running the mal- ware
on the system and using the model towards it. We also
obtained detailed information about the sys- tem, i.g.
hardware and software components used, via
HWiNFO64 and also fed this into our trained system
to provide it with context. The model detected that a
malware was run on the system in only 56 seconds.
As a result, we would like to note that our trained
model has practical use in protecting systems from
malicious software threats. In addition, our model
outperformed Maxwell’s work (Maxwell et al., 2021),
which stated an accuracy of 95.83%. In contrast, our
model performed slightly better at identifying mali-
cious activity, with an accuracy of 95.97%.
Figure 2: Training and testing accuracy.
6
CONCLUSIONS AND FUTURE
WORK
In conclusion, our experimental methodology in-
volved evaluating various deep learning architectures
for the detection of malicious activity within
computer systems. Through rigorous experimentation
and model evaluation, we identified the BiLSTM
model as the most effective in accurately classifying
instances of malware with a high accuracy of 95.97%,
recall rate of 95.08%, precision of 92.46%, and F1
score of 93.75%. The results obtained underscore the
significance of utilizing recurrent neural networks
particularly BiLSTM in handling sequential data and
capturing complex patterns indicative of malicious
behavior. Moreover, our real-time malware detection
experiment further validates the practical utility of the
BiLSTM model in safeguarding systems against
cyber threats.
In the future, our goal is to investigate more
characteristics and data sources to enhance the
function- ality and resilience of our detection system.
This in- cludes incorporating dynamic behavioral
analysis and network traffic data to improve
detection accuracy and resilience against evolving
malware variants. Ad- ditionally, we plan to
investigate techniques for enhancing the real-time
detection speed and scalability of our model ensuring
its effectiveness in large-scale deployment scenarios.
ACKNOWLEDGMENT
The authors are so grateful to the Department of Com-
puter Science and Engineering at Tezpur University
for providing us with the laboratory resources re-
quired to carry out our study.
REFERENCES
HWiNFO - free system information, monitoring and diag-
nostics. HWiNFO. April, 2020.
Abusitta, A., Li, M. Q., and Fung, B. C. (2021). Malware
classification and composition analysis: A survey of
recent developments. Journal of Information Security
and Applications, 59:102828.
Alomari, E. S., Nuiaa, R. R., Alyasseri, Z. A. A.,
Mohammed, H. J., Sani, N. S., Esa, M. I., and Musawi,
B. A. (2023). Malware detection using deep learn- ing
and correlation-based feature selection. Symmetry,
15(1):123.
Alsmadi, T. and Alqudah, N. (2021). A survey on mal-
ware detection techniques. In 2021 international con-
ference on information technology (ICIT), pages 371–
376. IEEE.
Dutta, N., Jadav, N., Tanwar, S., Sarma, H. K. D., Pricop,
E., Dutta, N., Jadav, N., Tanwar, S., Sarma, H. K. D.,
and Pricop, E. (2022). Introduction to malware analy-
sis. Cyber Security: Issues and Current Trends, pages
129–141.
Gao, Y., Su, J., Li, J., Wang, S., and Li, C. (2024).
A
neural network framework based on convnext for side-
channel hardware trojan detection. ETRI Journal.
Ghosh, A., Nath, M., Das, D., Ghosh, S., and Sen, S. (2022).
Electromagnetic analysis of integrated on- chip sensing
loop for side-channel and fault-injection attack
detection. IEEE Microwave and Wireless Com- ponents
Letters, 32(6):784–787.
Hospodar, G., Gierlichs, B., De Mulder, E., Verbauwhede,
I., and Vandewalle, J. (2011). Machine learning in side-
channel analysis: a first study. Journal of Cryp-
tographic Engineering, 1(4):293–302.
Islam, N. and Shin, S. (2023). Review of deep learning-
based malware detection for android and windows
system. arXiv preprint arXiv:2307.01494.